Skip to content
Snippets Groups Projects
  1. Sep 27, 2013
  2. Sep 26, 2013
  3. Sep 23, 2013
  4. Sep 20, 2013
  5. Sep 19, 2013
    • Stephen Smalley's avatar
      Label /dev/socket/mdns with its own type. · 4caf8c99
      Stephen Smalley authored
      
      Otherwise it gets left in the general device type, and we get denials such
      as:
      type=1400 msg=audit(1379617262.940:102): avc:  denied  { write } for  pid=579 comm="mDnsConnector" name="mdns" dev="tmpfs" ino=3213 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=sock_file
      
      This of course only shows up if using a confined system_server.
      
      Change-Id: I2456dd7aa4d72e6fd15b55c251245186eb54a80a
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      4caf8c99
  6. Sep 18, 2013
  7. Sep 17, 2013
    • Alex Klyubin's avatar
      2/2: Rename domain "system" to "system_server". · 4103b3f2
      Alex Klyubin authored
      This CL completes the renaming of domain system to system_server by
      removing the "system" typealias that was temporarily added to avoid
      breaking the build while the rename CLs are landing.
      
      Change-Id: I05d11571f0e3d639026fcb9341c3476d44c54fca
      4103b3f2
    • Alex Klyubin's avatar
      1/2: Rename domain "system" to "system_server". · 1fdee11d
      Alex Klyubin authored
      This is a follow-up CL to the extraction of "system_app" domain
      from the "system" domain which left the "system" domain encompassing
      just the system_server.
      
      Since this change cannot be made atomically across different
      repositories, it temporarily adds a typealias "server" pointing to
      "system_server". Once all other repositories have been switched to
      "system_server", this alias will be removed.
      
      Change-Id: I90a6850603dcf60049963462c5572d36de62bc00
      1fdee11d
  8. Sep 13, 2013
  9. Sep 12, 2013
    • Stephen Smalley's avatar
      Extend to check indirect allow rules and conditional rules. · 640991bb
      Stephen Smalley authored
      
      $ sepolicy-check -s untrusted_app -t mediaserver -c binder -p call -P out/target/product/manta/root/sepolicy
      Match found!
      
      Also removed loading of initial SIDs as that is not required for
      this functionality and it leaks memory as it is never freed.
      valgrind now reports no leaks.
      
      Change-Id: Ic7a26fd01c57914e4e96db504d669f5367542a35
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      640991bb
    • Nick Kralevich's avatar
      Allow apps to execute app_data_files · a24a991d
      Nick Kralevich authored
      Fixes the following denial:
      
      <5>[28362.335293] type=1400 audit(1378991198.292:24): avc:  denied  { execute } for  pid=1640 comm="facebook.katana" path="/data/data/com.facebook.katana/app_libs/libfb_jpegturbo.so" dev="mmcblk0p23" ino=652556 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:app_data_file:s0 tclass=file
      
      Change-Id: I4a515610149f06f0c49194feb6bc96e9b3080c12
      a24a991d
  10. Sep 10, 2013
  11. Sep 06, 2013
  12. Sep 05, 2013
    • Geremy Condra's avatar
      Merge "Fix more long-tail denials." · 21d13e9b
      Geremy Condra authored
      21d13e9b
    • Geremy Condra's avatar
      Fix more long-tail denials. · 217f8afc
      Geremy Condra authored
      For additional context-
      
      The denials related to init_tmpfs are of the form:
      
      denied  { read } for  pid=12315 comm=""dboxed_process0"" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=""tmpfs"" ino=9464 scontext=u:r:isolated_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file
      
      (the path above is "/dev/ashmem/dalvik-heap (deleted)")
      
      The denials related to executing things from the dalvik cache are of the form:
      
      enied  { execute } for  pid=3565 comm=""dboxed_process0"" path=""/data/dalvik-cache/system@app@Chrome.apk@classes.dex"" dev=""mmcblk0p28"" ino=105983 scontext=u:r:isolated_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file
      
      The denials related to isolated_app and the init socket are:
      
      denied  { getattr } for  pid=3824 comm=""Binder_2"" path=""socket:[14059]"" dev=""sockfs"" ino=14059 scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
      
      The getopt denials for the aforementioned socket are:
      
      denied  { getopt } for  pid=3824 comm=""Binder_2"" path=""/dev/socket/dumpstate"" scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
      
      Change-Id: I3c57702e2af5a779a7618da9aa40930e7f12ee49
      217f8afc
  13. Sep 04, 2013
  14. Aug 30, 2013
  15. Aug 29, 2013
  16. Aug 28, 2013
Loading